By Jake Edge
September 2, 2009
A recent report
about a Skype trojan that could extract voice calls as mp3 files and
ship them off to other locations led to
an interesting discussion on the Fedora users mailing list. The trojan
itself is somewhat unsurprising as there have been persistent rumors about
wiretapping back doors in Skype for some time. The trojan is
Windows-only, but it does come with most of the source code, which makes it
interesting to those who study malware. While not a direct threat to Linux
users, it does highlight a number of privacy and security issues to ponder.
Skype is a popular voice over IP (VoIP) application that runs on Linux, Mac
OS X, and Windows. Part of its appeal is that there are many users of the
free (as in beer) software, so folks can make free phone calls to many of
their friends and family. But it is a closed source tool that resists
attempts to reverse-engineer its protocol, so there are no interoperable
free (as in freedom) equivalents.
Daniel B. Thurman brought up the
trojan and wondered if it was an example of the back doors or interception
facilities that governments
have long been rumored to be pushing for Skype. That set off a thread
in which "black helicopters" made a tongue-in-cheek appearance, but there
were also more serious postings. Marko Vojinovic asks about whether there are ongoing attempts
to reverse-engineer the Skype protocol:
I have a feeling that the majority of Linux users would switch to Ekiga or
something else open source, if only it gave them support to communicate with
skype peers on the other end. Linux folks (myself included) use skype mainly
because all their friends and other contacts also use it, and it is completely
impossible to convince them all to go the open source way. But if Ekiga would
support the protocol, it would eliminate the need to install or use skype
binary itself, while functionality would be preserved. Not to mention better
support for sound and video hardware etc.
There are a number of problems with that, as was pointed out, including
the likelihood that Skype would change the protocol to cripple
interoperability, much as instant messaging companies have done along the
way. Roberto Ragusa noted that there have
been people who looked at Skype, but they "found that it contains
tons and tons of cryptography, obfuscation and countermeasures against
debugging or reverse engineering." That is of concern he said
because one cannot be sure of exactly what it's doing: "A closed
source code like that and with an explicit purpose to build a crypted P2P
network bypassing firewalls with every trick possible is something to be
nervous about."
Alan Cox had some additional thoughts
on reverse-engineering the code: "The person who completely reverse
engineers skype probably destroys it. If you can write a skype client [then]
the spammers can write skype spam tools as well." He also mentions
the "mostly circumstantial" evidence that law enforcement has
added intercept facilities to Skype itself. Furthermore, anyone who might
be working on the problem has good reason to do it quietly, he said:
I would imagine anyone doing so is keeping fairly quiet - there is big
money on offer from the bad guys for skype trojans, intercepts and
clients, while anyone on the good side fiddling with it faces jail and
[harassment] - a fine example of perverse economic incentives.
So, we have a closed source application, which uses malware-like techniques
to obfuscate its functioning, and folks willingly run it on their
computers. In some ways, that's no different than any other closed source
application, but there are a few differences. Skype, by its very nature,
must use the network to send encrypted data to multiple untrusted machines
elsewhere. While it may not be compromised by governmental authorities in
the standard binary, it is a known target of those entities, and this
trojan demonstrates a way that it might be compromised. Overall, it would
seem there are a few risks to both security and privacy from that kind of
application—more so than a closed source word processor or
non-networked game.
Free software solutions, like Ekiga, may be
able to overcome some of the shortcomings of Skype. But, if those
solutions become popular, they are likely to run afoul of the spammers and
scammers that Cox warns about. It's likely to be true of regular and
cellular phone service as well, but a warning from "Tim" in the thread is worth
repeating:
Moral of the story; don't conduct illegal business over it, don't
conduct legal but confidential conversations over it; and if you're in
one of those places where criticising the government has nasty
repercussions, I wouldn't do that over it, either.
While Skype provides a nice service—without charge in many
cases—it does present a bit of a privacy headache. If it can be
subverted for wiretapping purposes, it can undoubtedly be subverted for
other reasons. Some of those could present security headaches as well.
Since we don't really know what the Skype code does when it isn't infected,
it will be
difficult to determine if its behavior changes in a malicious way. That
should be a little worrisome.
(
Log in to post comments)